A Probabilistic Framework for Distributed Localization of Attackers in MANETs

  • Alessandra De Benedictis
  • Behzad Koosha
  • Massimiliano Albanese
  • Valentina Casola
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8203)

Abstract

Mobile Ad-hoc Networks (MANETs) are frequently exposed to a wide range of cyber threats due to their unique characteristics. The lack of a centralized monitoring and management infrastructure and the dynamic nature of their topology pose new and interesting challenges for the design of effective security mechanisms. While conventional methods primarily focus on detecting attacks, in this work we focus on estimating the attackers’ physical location in the network, and propose a probabilistic framework for aggregating information gathered from nodes reporting malicious activity in their vicinity. In order to overcome the limitations of the decentralized nature of MANETs, we present a distributed approach to attacker localization based on dynamically partitioning the network into clusters. These self-organizing clusters can (i) independently find the approximate location of the attackers in real time, and (ii) deploy trusted resources to capture attackers. We show, through experiments in a simulated environment, that our approach is effective and efficient.

Keywords

Attacker Localization Mobile Ad-hoc Networks Distributed Computing Clustering 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Albanese, M., De Benedictis, A., Jajodia, S., Shakarian, P.: A probabilistic framework for localization of attackers in mANETs. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 145–162. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  2. 2.
    Baker, D.J., Ephremides, A.: The architectural organization of a mobile radio network via a distributed algorithm. IEEE Transactions on Communications 29(11), 1694–1701 (1981)CrossRefGoogle Scholar
  3. 3.
    Baker, D.J., Ephremides, A.: A distributed algorithm for organizing mobile radio telecommunication networks. In: Proceedings of the 2nd International Conference on Distributed Computer Systems, Paris, France, pp. 476–483 (1981)Google Scholar
  4. 4.
    Basu, P., Khan, N., Little, T.D.C.: A mobility based metric for clustering in mobile ad hoc networks. In: Proceedings of the 21st International Conference on Distributed Computing Systems Workshops, Mesa, AZ, USA, pp. 413–418 (April 2001)Google Scholar
  5. 5.
    Chatterjee, M., Das, S.K., Turgut, D.: WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing 5(2), 193–204 (2002)CrossRefGoogle Scholar
  6. 6.
    Liu, H., Liu, Z., Chen, Y., Xu, W.: Localizing multiple jamming attackers in wireless networks. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, pp. 517–528 (June 2011)Google Scholar
  7. 7.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, USA, pp. 255–265 (August 2000)Google Scholar
  8. 8.
    Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Transactions on Parallel and Distributed Systems 24(1), 44–58 (2013)CrossRefGoogle Scholar
  9. 9.
    Zeng, Y., Cao, J., Hong, J., Xie, L.: Secure localization and location verification in wireless sensor networks. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS 2009), Macao, China, pp. 864–869 (October 2009)Google Scholar
  10. 10.
    Zhan, S., Li, J.: Active cross-layer location identification of attackers in wireless sensor networks. In: Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET 2010), Chengdu, China, vol. 3, pp. 240–244 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Alessandra De Benedictis
    • 2
  • Behzad Koosha
    • 1
  • Massimiliano Albanese
    • 1
  • Valentina Casola
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Department of Electrical Engineering and Information TechnologyUniversity of Naples “Federico II”NaplesItaly

Personalised recommendations